aboutsummaryrefslogtreecommitdiff
path: root/README
diff options
context:
space:
mode:
authorPeter Stephenson <pws@zsh.org>2014-10-06 17:16:12 +0100
committerPeter Stephenson <pws@zsh.org>2014-10-06 17:16:12 +0100
commit43c8bc81cf96c22726aacf87bb9a0a982f43b32e (patch)
tree1cab5f6ca8a84f6691956e3d4ab0b497f73c9ef2 /README
parenta65fb0677c6188220bf5ceacdb8d9a1a2f24883f (diff)
downloadzsh-43c8bc81cf96c22726aacf87bb9a0a982f43b32e.tar.gz
zsh-43c8bc81cf96c22726aacf87bb9a0a982f43b32e.tar.xz
zsh-43c8bc81cf96c22726aacf87bb9a0a982f43b32e.zip
unposted (discussed offline): update README for integer import vulnerability
Diffstat (limited to 'README')
-rw-r--r--README8
1 files changed, 5 insertions, 3 deletions
diff --git a/README b/README
index 42105ee8d..e3ccc70b1 100644
--- a/README
+++ b/README
@@ -10,9 +10,11 @@ There are minor new features as well as bug fixes since 5.0.6.
Note in particular there is a security fix to disallow evaluation of the
initial values of integer variables imported from the environment (they
-are instead treated as literal numbers). Although no exploits are
-currently known with this issue it is recommended to upgrade as soon as
-possible.
+are instead treated as literal numbers). That could allow local
+privilege escalation, under some specific and atypical conditions where
+zsh is being invoked in privilege elevation contexts when the
+environment has not been properly sanitized, such as when zsh is invoked
+by sudo on systems where "env_reset" has been disabled.
Installing Zsh
--------------